2019
DOI: 10.1007/s11128-019-2308-4
|View full text |Cite
|
Sign up to set email alerts
|

Semi-quantum identification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
22
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 36 publications
(22 citation statements)
references
References 37 publications
0
22
0
Order By: Relevance
“…|a, c, e a,b,c (16) where the |e a,b,c are arbitrary states in E's ancilla (again, we assume without loss of generality that E's ancilla is cleared to some initial pure state |χ E ). Note that we are not assuming a particular structure to this attack (e.g., we do not assume it consists of the Rw operator used in the proof of Theorem 1-instead, it may be arbitrary and if we prove security here, we will gain security of ent since it will cover any attack against that protocol).…”
Section: B Proof Of Security For Owmentioning
confidence: 99%
See 1 more Smart Citation
“…|a, c, e a,b,c (16) where the |e a,b,c are arbitrary states in E's ancilla (again, we assume without loss of generality that E's ancilla is cleared to some initial pure state |χ E ). Note that we are not assuming a particular structure to this attack (e.g., we do not assume it consists of the Rw operator used in the proof of Theorem 1-instead, it may be arbitrary and if we prove security here, we will gain security of ent since it will cover any attack against that protocol).…”
Section: B Proof Of Security For Owmentioning
confidence: 99%
“…Since its original introduction in 2007, there have been numerous new semiquantum key distribution (SQKD) protocols developed [6]- [12]. There have also been extensions to the model beyond basic key distribution including secret sharing [13]- [15], identification [16], and state comparison [17]- [19].…”
Section: Introductionmentioning
confidence: 99%
“…To resist this kind of attacks, the photon number splitter device and the optical wavelength filter device could be equipped [43,44]. Besides, identification should be employed to resist man-in-the-middle attack [45][46][47].…”
Section: Security Analysismentioning
confidence: 99%
“…CloQ protocols involve at least one classical party (or CloQ party) who is restricted to using the four classical operations 1-4 described below for interacting with a quantum channel. CloQ protocols have been shown to exhibit highly interesting theoretical properties; currently, their most well understood application is SQKD (see [18] for a recent review), but CloQ protocols have also been devised to solve other cryptographic problems, including secret sharing [19], [20], [21], secure direct communication [22], [23], [24], [25], identity verification [26], [27], and private state comparison [28]. CloQ protocols may even be devised in the future for quantum verification by defining a CloQ variant of QPIP (quantum prover interactive proofs) [29], which could allow a CloQ party to verify quantum computations performed by a fully quantum center (or prover).…”
Section: Introductionmentioning
confidence: 99%